SlideShare a Scribd company logo
Cloud computing
Data sharing with accountability in the cloud


Group members:                    Guided by:
 k.Jeganathan                  Ms. chitra.v M.E.,
 A.susheenthiran
Objective
Cloud computing is a recent model for enabling
convenient, on-demand network access to a shared
pool of configurable computing resources.

Cloud computing can play a significant role in a
variety of areas including innovations, virtual worlds,
e-business, social networks, or search engines.
Abstract
The cloud enables efficient data sharing in the cloud.
Users fear that data are accessed and outsourced
without their permission.
To over come this problem we provide accountability
mechanism for both data owners as well as client.
Client needs to get access privilege from data owner
for accessing the data in the cloud.
Client gets access privilege from data owner and
retrieves the data from csp.
Contd..
Before that data owners should login to the csp and
stores their data in encrypted form along with client
access privilege , that is jar file.
Client logins to the csp only if he gets permission
from data owner for that client should be
authenticated.
A file which contains the information of each user
with access privileges and stores along with the data
file in the csp.
Existing system
The data processed on clouds are often outsourced,
leading to a number of issues related to
accountability, including the handling of personally
identifiable information.

Such fears are becoming a significant barrier to the
wide adoption of cloud services. Data’s are accessed
without the permission of data owner data are
modified and outsourced so owners fear of losing
their control.
Drawbacks
Accessing the data without the knowledge of data
owner.
Occurrence of data loss.
Data owner loss the control of their own data.
Possible of attacks like copying, man-in-the-middle
attack etc..
Integrity cannot be verified due to loss of control.
Proposed system
We propose a client accountability mechanism for
providing the control for the data owners.
Client can access the data only if the owners give
authentication and access privilege.
Data’s are stored in jar format for avoiding the loss of
data.
While the client access the data csp will generates a
log file which includes the details of client. Auditing
mechanisms can be done with the help of log file.
Advantages
Csp storage availability for data owners to store the data.
Separate authentication mechanism for clients with
access privilege control.
Only privileged clients can access the storage file.
Availability of secured data since the data's are stored in
csp.
Unauthorized clients cannot access the csp without the
data owner permission.
Batch auditing is performed.
To check the integrity log file will be sent to data owner
with the access privilege of the each client.
Data flow
Enhancement
Even though batch auditing was performed only by
verifying the access privilege, the data owner justifies
the data has been modified or not.

But the data owner doesn’t gain information about the
content in case of users whose write access privilege.
Suppose the client acts as hacker and provides the
correct information to the csp but hacks the content in
that cases data owner fear of losing their content.
Contd..
We implement MAC algorithm for integrity
verification, at the time of jar storage itself data
owner will generate MAC code for that data and store
it to the csp.

If unauthorized client outsource the data with the
modified content ,the csp will generates the MAC
code for that data and compare with original data
MAC code if the MAC is not same then integrity has
been brooked hence csp does not accept the content.
Algorithms used
MD5(message digest) algorithm for key generation to
each client during the accountability process of client.

PBE(password based encryption)algorithm for data
encryption and data decryption.

RSA algorithm for public and private key generation.

HMAC(hash message authentication code) algorithm
for integrity verification(future enhancement).
Modules
Accountability for cloud users.
Jar files storage in the CSP.
Logs file generation to data owner.
Integrity verification for data outsourcing.
Module description
Accountability for cloud users.
Client logins to the data owner and gets the access
privilege and data owner gathers client information
like file that he needs to access. To access the data
owner files first client should be an authenticated for
accessing those files. Client should register and login
to the data owner.
Data flow diagram

                  DATA OWNER
    CSP
                    DETAILS




 DATA OWNER            CLIENT
REGISTRATION        REGISTRATION
Contd..
Jar files storage in the CSP.
Data owner stores the data in the csp that is defined as
jar file storage; the file includes data file and client
information. Data will be encrypted before storing in
the csp. Data owners store the data along with the
client’s access privilege in the cloud service provider.
Owner’s data and access privilege are modified in jar
format and stored in csp. The JAR file includes a set of
simple access control rules specifying whether and how
the cloud servers and possibly other data stakeholders
(users, companies) are authorized to access the content
itself.
Client access
                MAC code
   policies




                 Encrypted
 Data owner
                   data




                 Creation of
     CSP
                   jar file
Contd..

   Logs file generation to data owner.
If client want to get data from csp while mean time it
   generates the log file to the data owner, log file consist
   of access privilege, by auditing the log file and clients
   access privilege data owner verifies the integrity of the
   data. Once the client gets access permission from the
   owner csp storage generates the log file to the data
   owner. The log file consist of clients access permission
   details along with the date. The integrity can be verified
   with the help of the generated log record.
Contd..
 Integrity verification for data outsourcing.
If the client wants to outsource the data ,it uploads
 the data and produces to the csp, the csp does not
 accept all data from client it generates a Mac code
 from the client data if that ,Mac code matches
 with the code generated by the data owner then
 only csp accepts to outsource it. We use HMAC
 algorithm for integrity verification, and thus
 integrity is verified for the content also.
System Requirements
Software Requirements
  OS             :    Windows Xp
  Language       :    Java
  IDE            :    NetBeans 6.9.1

Hardware Requirements
  System        :       Pentium IV2.4GHz.
  Hard Disk     :       250 GB.
  Monitor       :       15 VGA Color
  Mouse         :       Logitech.
  Ram           :       1GB.
Literature survey
A major feature of the cloud services is
that users’ data are usually processed
remotely in unknown machines that users
do not own or operate.
highly decentralized information
accountability framework to keep track of
the actual usage of the users’ data in the
cloud.
Contd..
Cloud services are delivered from data
centers located throughout the world.
Cloud computing is surrounded by many
security issues like securing data, and
examining the utilization of cloud by the
cloud computing vendors.
The boom in cloud computing has brought
lots of security challenges for the
consumers and service providers.
Contd..
Aims to identify the most vulnerable
security threats in cloud computing, which
will enable both end users and vendors to
know about the key security threats
associated with cloud computing.
The main advantage is cost effectiveness
for the implementation of the hardware
and software and this technology can
improve quality of current system
conclusion
By verifying the integrity a secure data sharing is
held in the cloud so that data owner need not fear
about the contents of him.
To strengthen user’s control
under extensive experimental studies
Further improvement provides efficiency and
effectiveness
References
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen-
baum, J.Hendler, and G.J. Sussman, “Information
Accountability,” Comm. ACM, vol. 51, no. 6, pp. 82-
87, 2008.

D. Boneh and M.K. Franklin, “Identity-Based
Encryption from the Weil Pairing,” Proc. Int’l
Cryptology Conf. Advances in Cryptology,
 pp. 213-229, 2001.
Contd..
B. Chun and A.C. Bavier, “Decentralized Trust
Management and Accountability in Federated
Systems,” Proc. Ann. Hawaii Int’l Conf.
System Sciences (HICSS), 2004.

B. Crispo and G. Ruffo, “Reasoning about
Accountability within Delegation,” Proc. Third Int’l
Conf. Information and Comm. Security
(ICICS), pp. 251-260, 2001.
QUESTIONS ?
THANK YOU

More Related Content

What's hot

Azure storage
Azure storageAzure storage
Azure storage
Adam Skibicki
 
Microsoft Azure Storage Basics
Microsoft Azure Storage BasicsMicrosoft Azure Storage Basics
Microsoft Azure Storage Basics
Sai Kishore Naidu
 
Data platform data pipeline(Airflow, Kubernetes)
Data platform data pipeline(Airflow, Kubernetes)Data platform data pipeline(Airflow, Kubernetes)
Data platform data pipeline(Airflow, Kubernetes)
창언 정
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experimentsrichendraravi
 
Denodo as the Core Pillar of your API Strategy
Denodo as the Core Pillar of your API StrategyDenodo as the Core Pillar of your API Strategy
Denodo as the Core Pillar of your API Strategy
Denodo
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
Peter Wood
 
Cloud computing visualized.
Cloud computing visualized. Cloud computing visualized.
Cloud computing visualized.
Soujan Kamesh
 
CQRS and Event Sourcing
CQRS and Event Sourcing CQRS and Event Sourcing
CQRS and Event Sourcing
Inho Kang
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Grupo AW
Grupo AWGrupo AW
Grupo AW
Rodrigo Martins
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Marius Zaharia
 
Monitoração avançada com Zabbix 2
Monitoração avançada com Zabbix 2Monitoração avançada com Zabbix 2
Monitoração avançada com Zabbix 2
Jose Augusto Carvalho
 
Introduction to mongo db
Introduction to mongo dbIntroduction to mongo db
Introduction to mongo db
Hemant Sharma
 
A complete guide to azure storage
A complete guide to azure storageA complete guide to azure storage
A complete guide to azure storage
Himanshu Sahu
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptx
HetKhandol
 
10 Reasons for Choosing OpenSplice DDS
10 Reasons for Choosing OpenSplice DDS10 Reasons for Choosing OpenSplice DDS
10 Reasons for Choosing OpenSplice DDS
Angelo Corsaro
 
CouchDB
CouchDBCouchDB
CouchDB
Rashmi Agale
 
Drupal Workshop: Introducción al Backend de Drupal
Drupal  Workshop: Introducción al Backend de DrupalDrupal  Workshop: Introducción al Backend de Drupal
Drupal Workshop: Introducción al Backend de Drupal
David (davidjguru) Rodríguez
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
Yukti Kaura
 

What's hot (20)

Azure storage
Azure storageAzure storage
Azure storage
 
Microsoft Azure Storage Basics
Microsoft Azure Storage BasicsMicrosoft Azure Storage Basics
Microsoft Azure Storage Basics
 
Data platform data pipeline(Airflow, Kubernetes)
Data platform data pipeline(Airflow, Kubernetes)Data platform data pipeline(Airflow, Kubernetes)
Data platform data pipeline(Airflow, Kubernetes)
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experiments
 
Denodo as the Core Pillar of your API Strategy
Denodo as the Core Pillar of your API StrategyDenodo as the Core Pillar of your API Strategy
Denodo as the Core Pillar of your API Strategy
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
Cloud computing visualized.
Cloud computing visualized. Cloud computing visualized.
Cloud computing visualized.
 
CQRS and Event Sourcing
CQRS and Event Sourcing CQRS and Event Sourcing
CQRS and Event Sourcing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Grupo AW
Grupo AWGrupo AW
Grupo AW
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
 
Monitoração avançada com Zabbix 2
Monitoração avançada com Zabbix 2Monitoração avançada com Zabbix 2
Monitoração avançada com Zabbix 2
 
Introduction to mongo db
Introduction to mongo dbIntroduction to mongo db
Introduction to mongo db
 
A complete guide to azure storage
A complete guide to azure storageA complete guide to azure storage
A complete guide to azure storage
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptx
 
10 Reasons for Choosing OpenSplice DDS
10 Reasons for Choosing OpenSplice DDS10 Reasons for Choosing OpenSplice DDS
10 Reasons for Choosing OpenSplice DDS
 
CouchDB
CouchDBCouchDB
CouchDB
 
Drupal Workshop: Introducción al Backend de Drupal
Drupal  Workshop: Introducción al Backend de DrupalDrupal  Workshop: Introducción al Backend de Drupal
Drupal Workshop: Introducción al Backend de Drupal
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
 

Viewers also liked

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
SunkaraHariNarayana
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
Sravan Narra
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudChanakya Chandu
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
Swapnil Salunke
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 

Viewers also liked (11)

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Presentech'10
Presentech'10Presentech'10
Presentech'10
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 

Similar to Data sharing with accountability in cloud

Ppt 1
Ppt 1Ppt 1
Pp1t
Pp1tPp1t
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
IEEEGLOBALSOFTTECHNOLOGIES
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
IEEEGLOBALSOFTTECHNOLOGIES
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Karyavardhi Sandra
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 

Similar to Data sharing with accountability in cloud (20)

Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Data sharing with accountability in cloud

  • 1. Cloud computing Data sharing with accountability in the cloud Group members: Guided by: k.Jeganathan Ms. chitra.v M.E., A.susheenthiran
  • 2. Objective Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing can play a significant role in a variety of areas including innovations, virtual worlds, e-business, social networks, or search engines.
  • 3. Abstract The cloud enables efficient data sharing in the cloud. Users fear that data are accessed and outsourced without their permission. To over come this problem we provide accountability mechanism for both data owners as well as client. Client needs to get access privilege from data owner for accessing the data in the cloud. Client gets access privilege from data owner and retrieves the data from csp.
  • 4. Contd.. Before that data owners should login to the csp and stores their data in encrypted form along with client access privilege , that is jar file. Client logins to the csp only if he gets permission from data owner for that client should be authenticated. A file which contains the information of each user with access privileges and stores along with the data file in the csp.
  • 5. Existing system The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Such fears are becoming a significant barrier to the wide adoption of cloud services. Data’s are accessed without the permission of data owner data are modified and outsourced so owners fear of losing their control.
  • 6. Drawbacks Accessing the data without the knowledge of data owner. Occurrence of data loss. Data owner loss the control of their own data. Possible of attacks like copying, man-in-the-middle attack etc.. Integrity cannot be verified due to loss of control.
  • 7. Proposed system We propose a client accountability mechanism for providing the control for the data owners. Client can access the data only if the owners give authentication and access privilege. Data’s are stored in jar format for avoiding the loss of data. While the client access the data csp will generates a log file which includes the details of client. Auditing mechanisms can be done with the help of log file.
  • 8. Advantages Csp storage availability for data owners to store the data. Separate authentication mechanism for clients with access privilege control. Only privileged clients can access the storage file. Availability of secured data since the data's are stored in csp. Unauthorized clients cannot access the csp without the data owner permission. Batch auditing is performed. To check the integrity log file will be sent to data owner with the access privilege of the each client.
  • 10. Enhancement Even though batch auditing was performed only by verifying the access privilege, the data owner justifies the data has been modified or not. But the data owner doesn’t gain information about the content in case of users whose write access privilege. Suppose the client acts as hacker and provides the correct information to the csp but hacks the content in that cases data owner fear of losing their content.
  • 11. Contd.. We implement MAC algorithm for integrity verification, at the time of jar storage itself data owner will generate MAC code for that data and store it to the csp. If unauthorized client outsource the data with the modified content ,the csp will generates the MAC code for that data and compare with original data MAC code if the MAC is not same then integrity has been brooked hence csp does not accept the content.
  • 12. Algorithms used MD5(message digest) algorithm for key generation to each client during the accountability process of client. PBE(password based encryption)algorithm for data encryption and data decryption. RSA algorithm for public and private key generation. HMAC(hash message authentication code) algorithm for integrity verification(future enhancement).
  • 13. Modules Accountability for cloud users. Jar files storage in the CSP. Logs file generation to data owner. Integrity verification for data outsourcing.
  • 14. Module description Accountability for cloud users. Client logins to the data owner and gets the access privilege and data owner gathers client information like file that he needs to access. To access the data owner files first client should be an authenticated for accessing those files. Client should register and login to the data owner.
  • 15. Data flow diagram DATA OWNER CSP DETAILS DATA OWNER CLIENT REGISTRATION REGISTRATION
  • 16. Contd.. Jar files storage in the CSP. Data owner stores the data in the csp that is defined as jar file storage; the file includes data file and client information. Data will be encrypted before storing in the csp. Data owners store the data along with the client’s access privilege in the cloud service provider. Owner’s data and access privilege are modified in jar format and stored in csp. The JAR file includes a set of simple access control rules specifying whether and how the cloud servers and possibly other data stakeholders (users, companies) are authorized to access the content itself.
  • 17. Client access MAC code policies Encrypted Data owner data Creation of CSP jar file
  • 18. Contd.. Logs file generation to data owner. If client want to get data from csp while mean time it generates the log file to the data owner, log file consist of access privilege, by auditing the log file and clients access privilege data owner verifies the integrity of the data. Once the client gets access permission from the owner csp storage generates the log file to the data owner. The log file consist of clients access permission details along with the date. The integrity can be verified with the help of the generated log record.
  • 19. Contd.. Integrity verification for data outsourcing. If the client wants to outsource the data ,it uploads the data and produces to the csp, the csp does not accept all data from client it generates a Mac code from the client data if that ,Mac code matches with the code generated by the data owner then only csp accepts to outsource it. We use HMAC algorithm for integrity verification, and thus integrity is verified for the content also.
  • 20. System Requirements Software Requirements OS : Windows Xp Language : Java IDE : NetBeans 6.9.1 Hardware Requirements System : Pentium IV2.4GHz. Hard Disk : 250 GB. Monitor : 15 VGA Color Mouse : Logitech. Ram : 1GB.
  • 21. Literature survey A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud.
  • 22. Contd.. Cloud services are delivered from data centers located throughout the world. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The boom in cloud computing has brought lots of security challenges for the consumers and service providers.
  • 23. Contd.. Aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. The main advantage is cost effectiveness for the implementation of the hardware and software and this technology can improve quality of current system
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. conclusion By verifying the integrity a secure data sharing is held in the cloud so that data owner need not fear about the contents of him. To strengthen user’s control under extensive experimental studies Further improvement provides efficiency and effectiveness
  • 30. References D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen- baum, J.Hendler, and G.J. Sussman, “Information Accountability,” Comm. ACM, vol. 51, no. 6, pp. 82- 87, 2008. D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001.
  • 31. Contd.. B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004. B. Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int’l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.